Skip to Main Content

The Identity Blog

Identity is Security: They Came, They Saw, They Breached

Have you been breached yet? If you haven’t yet, this might just be your week. The biggest story this week in security is the data leak known as Collection #1 that exposed 773 million records. You read that right – 773 million records, which include emails and passwords. However, Brian […]

Simplicity In The Solution: Steps Toward Identity Governance

It goes without saying that the amount of data and the number of ways to capture it is only going to increase. Transformative digital platforms have vaporized the boundaries traditionally surrounding organizations and exacerbated the complexity of their security environments. For any business, the stakes are as high as its […]

Challenge Accepted: Work Smarter When It Comes to Identity Management

It was a little more than a year ago when the executive leadership at this enterprise challenged its business units to find ways to work smarter.  And Terry Garbo, senior information security engineer at this organization, had one idea in particular: he’d go after the costs associated with service desk […]

Essence of Product Design

A high-quality product is a culmination of proper market research, strategic vision (usually offered by product management) and the engineering team designing and delivering the solution. It is relatively simple to design a product that is similar to another company’s product by copying ideas. It is much more challenging to […]

Identity is Security: What’s the Good Word?

If you could pick one word to predict the next year in identity, what would it be? That’s the question David Lee and Mike Kiser asked in this week’s episode of Mistaken Identity. Then join them for a discussion on some headlines, including newspaper printing presses stopped by ransomware, how […]

New Year, New Security

We’re all settling into our new year’s goals and putting our plans into action. For those of us in security, there is a barrage of new year ‘must-dos’ and doomsday scenarios thrown at us. Before you react, take time to step back and think about what you can do that […]

The Powers of Identity and Privilege: Seeing is Believing

Keeping organizations secure, while improving business and user productivity in today’s accelerating threat environment, continues to be a challenge for today’s IT and security leaders. As we have seen time and time again, the ongoing threat from cyber-attacks has demonstrated their ability to change the global business environment in an […]

Mistaken Identity: You Had One Word

“Describe the next year in identity in one word.” David Lee and Mike Kiser take up this challenge as they forecast the coming twelve months. (Spoiler alert: the episode is 34 minutes long, so apparently there was more to say than a single term.) Headlines include: newspaper printing presses stopped […]

When Food, Ideas and Code Come Together, SailPoint Crew Members “Hack to the Future”

In November, the SaaS organization at SailPoint Technologies ran its 2nd hackathon for 2018 – “Hack to the Future”.  44 crew members from engineering, DevOps, design, services and support came together to form teams and in under 2 days executed on a set of wide-ranging ideas –  some related to […]

Navigating the Application and Data Frontiers

In my recent conversation with security journalist and blogger George Hulme, we discussed a number of technology trends currently disrupting enterprises, including the accelerating adoption of enterprise software-as-a-service applications, mobile devices, cloud storage, and collaborative tools. Specifically, we spoke about the fact that much of this adoption occurs without the […]